General

  • Target

    5584-403-0x0000000000750000-0x000000000078E000-memory.dmp

  • Size

    248KB

  • MD5

    3724649ee148a51fbfad1e7a15e30bc0

  • SHA1

    623e42b8bbcec31082f751171aa157d09f294b2a

  • SHA256

    871dcfb258562cf579b7e80cfacdc3be0ce8b95193d412c3491b8d42fe29c8db

  • SHA512

    7513c88b5b10ccca06482622114af89e58520a899e126386fa2e97ea68e664ecd1c65446b564532f6cdc6d70822d6274960cca23c0297572f1d07c2afa9f2a2b

  • SSDEEP

    3072:3EjJpWunbNgcc+fw1nRKlnwT84Zhct/qR8NbtS6Gbmhmad3:3GTWubNgcc+I1nRKlwTQ/PNbtS7Khma

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@ytlogsbot

C2

185.216.70.238:37515

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 5584-403-0x0000000000750000-0x000000000078E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections